Service-Oriented Advanced Metering Infrastructure for Smart Grids
|
|
- Jeremy Brooks
- 5 years ago
- Views:
Transcription
1 Journal of Energy and Power Engineering 5 (2011) Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven 5600 MB, Netherlands 2. East-China Power Dispatching Center, East-China Grid Group Company, Shanghai , China Received: July 26, 2010 / Accepted: October 20, 2010 / Published: May 31, Abstract: Advanced Metering Infrastructure (AMI) enables smart grids to involve power consumers in the business process of power generation transmission, distribution and consumption. However, the participant of consumers challenges the current power systems with system integration and cooperation and security issues. In this paper, the authors introduce a service-oriented approach to AMI aiming at solving the intercommunication problem and meanwhile providing a trust and secure environment for smart grids. In this approach heterogeneous systems expose services to the network. System integration and cooperation are done through service composition. A generic service interfacing method is designed to develop standardized services for heterogeneous power systems. Moreover, role-based access control mechanism is used to guarantee the secure access to smart grids. With the seamless communication between consumers and power systems and among power systems themselves, this service-oriented AMI can associate consumers with actual system workload and furthermore support the intelligent running of power systems. Key words: Smart grids, AMI, service-oriented, generic interfacing, access control. 1. Introduction Smart grids advocate the participant of consumers in the power business process including power generation, transmission, distribution and consumption [1-3]. Through collecting consumers motivation, their monitoring result on delivered power quality, and feedback, power product providers and operators can shape their market models according to the real demand, dynamically distribute their power transmission, achieve network optimization, and provide high quality of service to their consumers. This requires smart grids must a) provide new functionality that enables the involvement of consumer, b) deal with the collaboration of heterogeneous systems including smart sensors, smart meter monitoring systems, various back-end power Corresponding author: S. Chen, Ph.D., assistant professor, research fields: sensor networks, components based architecture, security and resource management. shudong.chen@tue.nl. information systems (distribution system, accounting and billing system, etc.), c) guarantee the secure communication between consumer and back-end systems and that among back-end systems. In order to achieve these goals, Advanced Metering Infrastructure (AMI) is proposed which uses two-way communications, advanced sensors, and distributed computing to improve the efficiency, reliability and safety of power delivery and use [4, 5]. AMI has been national widely deployed including Italy, Sweden and Finland, etc. However, by the nature of distributed power transmission and distribution environment, power information systems consist of heterogeneous networks, performing communication using different communication protocols. Even in the same network there may exists heterogeneity between development languages, deployment hardware and system structures (database, I/O interface, etc.). Moreover, they are tightly coupled with the security distribution policy and horizontal segregation of networks. Some of them are
2 456 Service-Oriented Advanced Metering Infrastructure for Smart Grids even running individually. As a consequence, system interactions are rather difficult. Increasing deeply system integration, seamless communication, cost, and safety requirements of smart grids reveals the need for a flexible, reliable, reusable, as well as trustable architecture for AMI. Service-orient technology [6, 7] provides a solution to solve system cooperation in a distributed environment. Applications can be achieved through coordinating and connecting independent functional entities (services). Services expose well-defined interfaces to the network and are defined independent of hardware platforms, operating systems and programming languages. This makes it possible to interact in a uniform and universal way between services or systems. Therefore, in this paper, we propose a service-oriented AMI. We envisage a smart grids system as an environment in which functionalities are provided as scalable services. Users, which include power providers, operators and consumers, can simply interact with the system without knowing how to access and control these services. The service-oriented framework will support the interactions of services provided by heterogeneous systems where issues including security, cooperation, atomization, and dynamic adaptive will be considered. The remainder of this paper is organized as follows. In section 2 we describe the service-oriented AMI for smart grids followed with detailed design of the generic service interfacing method A_ITF and working principle of the role-based access control mechanism. In section 3 we analyze the feasibility of our design together with a tooling support A_MAP. Finally we summarize and conclude in section The Design of a Service-Oriented AMI 2.1 Service-Oriented AMI Different from the traditional power systems, a novel feature of smart grids is using AMI to setup the connection of power systems with their consumers. AMI grants consumers with capability to support the intelligent running of power systems. Customs can check the delivered power quality through monitoring the smart meters installed along the power transmission, distribution and user path. Under special circumstances, for instance, disturbing or theft happen, they can inform or be informed by the custom service center. They can specify their requirement based on actual requirements and available rate models. Moreover, their activities can be collected for power operators to make new energy marketing strategies. AMI also provides time stamped system information for the back-end system analysis. For instance, through reading smart meters, network performance will be monitored. Subsequently, alarm, dynamic dispatching and work load forecast can be achieved. Additionally, system self healing functionality can also be provided. Fig. 1 shows the service-oriented AMI design which includes a custom portal (load management system) and some example power systems. Functionalities of all the subsystems are represented as services. We also wrap the modules of existing power systems as services, for example, the smart meter reading will be done by calling distributed meter reading services running on smart meters. 2.2 Business Process Lifecycle in Service-Oriented AMI In a smart grids system, a business process, which is also called an application, is achieved through service coordination and connection. A power operator wants to add a new function to the smart grids system, for example, to let customers be informed with new power products and according rating model. To enable this, an orchestrator, on behalf of the operator, will follow the steps, depicted in Fig. 2 to construct such a business process then publish as an application in the system for later use. The lifecycle of a business process consists of the following phases: (1) Service development and deployment: a service provider exposes a set of functions in the form of a generic service to the network. (2) Service advertisement: when a new service is available, it makes its presence known to other services
3 Service-Oriented Advanced Metering Infrastructure for Smart Grids 457 Fig. 1 Service-oriented advanced metering infrastructure. Fig. 2 Lifecycle of a business process in service-oriented advanced metering infrastructure. on the network. If there is a repository service, it sends out the advertisement through broadcast or multicast. Services who are interested in this repository record this information and register themselves at this repository next. If there is no repository available, services broadcast themselves. (3) Realize an application: when there is a requirement of an application, an orchestrator is going to achieve it through service combination following the below steps. Service discovery: the orchestrator discovers required services. It sends out service queries and then receives a list of available services with required functionalities. Service binding: the orchestrator informs specific services to bind with each other in an order according to the application logic. During this process, the orchestrator checks the match between services, e.g.,
4 458 Service-Oriented Advanced Metering Infrastructure for Smart Grids the interfaces and the communication protocols. Service invocation: this is the stage where a service is connected and invoked after the application starts. A service is called directly by another service. Although control is still done by the orchestrator, as shown in steps 3.31 and 3.4, the orchestrator is no longer involved in service function invocation. Run time service management: during the application execution, in order to guarantee the overall performance, e.g., the throughput of a service and robustness of the whole system, services are monitored and managed about their availability and resource usage. (4) Service unbind: after the application finishes, the orchestrator orders services to disconnect from their bound services, clean up whatever state needs to be removed and relinquish the control which is implicitly transferred upon binding. 2.3 A_ITF: Generic Service Interfacing Services provided by the load management system and example power systems, e.g., on demand ordering service, demand response management service, are developed and exposed in a generic way, A_ITF, shown in Fig. 3, to enable the collaboration over a heterogeneous networking environment. Different from the existing Web Services [8] and UPnP [9] specifications, where services only contain interfaces which express services capabilities, A_ITF defines that interfaces of a service can be divided into two types: provided interface and required interface. Capabilities of a service are expressed as provided interfaces; capabilities a service needs for its work are specified as required interfaces. Service compositions are created by connecting (binding) these required and provided interfaces. Special interfaces are used to program the extra-functional aspects including security, management and discovery, but also the mentioned binding. Separate orchestrators are capable of searching services and connecting them to form applications; orchestrators can also expose themselves again as services. In this way, applications can be achieved by service collaboration. More importantly, services have the ability to search for the functionalities they require through the network. This can solve the problem that application logic is encapsulated within services and dramatically enhance the reusability of services and the flexibility of the system [10]. All published methods of a service are added to the function interface. A_ITF is designed to support two service advertisement mechanisms: the mediated way which is achieved through a repository and the immediate way when there is no repository available on the network. In an immediate discovery protocol, a service broadcasts advertisements and queries while it listens to messages of broadcasted advertisements and queries. In case a service requires some interfaces from other services, it keeps a list of these services when it receives the advertisement messages from them. A service can subscribe to the events generated by another service. The Event Generator provides methods to register and unregister event listeners, as well as a method to inform all registered event listeners of the occurrence of an event. The Event Listener interface provides a callback method that can be called by an event generator once subscribed events occur. The purpose of the binding interface is to bind a required interface of a service to another service that provides that matching function interface. 2.4 Role-Based Access Control In order to protect smart grids from malicious attack and protect the privacy of consumers, smart grids services can be added with security-related interfaces. Consequently, only authenticated users can access them. Service discovery, access, and collaboration all happen in a trustworthy environment. The security interface, illustrated in Fig. 4, is used for checking the identification and capability of a service user, which can be fetched from a ticket, to access a smart grids service. All activities including advertisement, discovery, access and collaboration can only be executed with carrying a valid ticket. Only authenticated users can access a service and
5 Service-Oriented Advanced Metering Infrastructure for Smart Grids 459 Fig. 3 Static view of A_ITF. Asymmetric cryptography [11] is used for communication secrecy. The cryptographic key pair for encryption and decryption is distributed by the CA. 3. Implementation and Analysis Fig. 4 A_ITF with security related interface. communication messages are encrypted. Due to the fact that power systems are distributed, a single-sign-on mechanism is supported by this security interface. Different access actions are granted to different service users according to their roles. For instance, a consumer has to show his ticket signed by a trusted third party Certificate Authorization (CA) and the system administrator can specify which access actions are permitted to different roles. In this way, each access to a service has to verify that it is authorized. Moreover, all exchanged messages in smart grids are encrypted. To address the feasibility of this service-oriented AMI, we have developed a tooling support, A_MAP, to wrap a deployment platform independent A_ITF service into a deployment platform specific service. Currently, to deploy a smart grids service in type of Web Service is supported. The structure of A_MAP is depicted in Fig. 5. Besides AMI, the proposed service-oriented design is suitable for other modules in smart grids including Advanced Distribution Operations (ADO), Advanced Transmission Operations (ATO) and Advanced Asset Management (AAM). With the flexibility provided by the generic service interfacing, real time simulation, distributed operation, network optimization can be achieved with low-cost.
6 460 Service-Oriented Advanced Metering Infrastructure for Smart Grids Fig. 5 A_MAP overview. 4. Conclusions This paper presents a service-oriented AMI for smart grids to solve the intercommunication problem of current power systems. System functionalities are wrapped as scalable smart grids services exposing generic interfaces defined by A_ITF. A mapping tool, A_MAP, is developed to wrap a deployment platform independent smart grids services as Web Services. It supports the seamless interactions of heterogeneous systems where issues including flexibility, reliability and security are considered. With achieved seamless communication, this service-oriented AMI can associate consumers with actual system workload, furthermore support the intelligent running of power systems and meanwhile providing a trust and secure environment for smart grids. Acknowledgments We thank Melissa Tjiong and Remi Bosman for their technical feedback at the design and implementation stages of this work. We also thank our anonymous reviewers for their invaluable feedback which helped in improving the quality of the paper. References [1] M.C. Kintner-Meyer, D.P. Chassin, L.D. Kannberg, R.G. Pratt, J.G. DeSteese, L.A. Schienbein, et al., GridWise: The benefits of a transformed energy system, Pacific Northwest National Laboratory under Contract with the United States Department of Energy, 2008, p. 25. [2] M. Amin, B.F. Wollenberg, Toward a smart grid: Power delivery for the 21st century, IEEE Power and Energy Magazine 3 (5) (2005) [3] Cisco Outlines Strategy for Highly Secure, Smart Grid Infrastructure, 2009, available online at: [4] B. Loeff, AMI Anatomy: Core Technologies in Advanced Metering, Ultrimetrics Newsletter (Automatic Meter Reading Association), 2008, available online at: [5] Rochester Gas and Electric Corporation and New York State Electric and Gas Company, Advanced Metering Infrastructure Overview and Plan, 2007, available online at: Filing.pdf. [6] A. Korostelev, J.J. Lukkien, J. Nesvadba, Y. Qian, QoS management in distributed service oriented systems, Parallel and distributed computing and networks, in: Proc of IASTED Int. Conf. on Parallel and Distributed Computing and Networks, Innsbruck, Austria, Feb., [7] S. Chen, W. Zhang, F. Ma, A cooperative computing platform for drug discovery and design, in: IEEE Service Computing Conference, 2004, pp [8] E. Cerami, Web Services Essentials: Distributed Applications with XML-RPC, SOAP, UDDI & WSDL, O Reilly, [9] UPnP Forum, UPnP Device Architecture, Version 1.0, available online at: ecture-v1.0.pdf, [10] S. Chen, J. Lukkien, R. Bosman, R. Verhoeven, A generic service interfacing approach for home networking, in: IEEE International Conference on Consumer Electronics, 2010, pp [11] R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure: Certificate and CRL Profile, available online at:
A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M.
A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M. Published in: International Journal of Communications, Network and System Sciences DOI:
More informationA Generic Service Architecture for Secure Ubiquitous Computing Systems
Int. J. Communications, Network and System Sciences, 2012, 5, 50-65 http://dx.doi.org/10.4236/ijcns.2012.51007 Published Online January 2012 (http://www.scirp.org/journal/ijcns) A Generic Service Architecture
More informationSOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE
SOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE Tomas Cerny, Software Engineering, FEE, CTU in Prague, 2014 1 ARCHITECTURES SW Architectures usually complex Often we reduce the abstraction
More informationUNICORE Globus: Interoperability of Grid Infrastructures
UNICORE : Interoperability of Grid Infrastructures Michael Rambadt Philipp Wieder Central Institute for Applied Mathematics (ZAM) Research Centre Juelich D 52425 Juelich, Germany Phone: +49 2461 612057
More informationAgent-Enabling Transformation of E-Commerce Portals with Web Services
Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:
More informationEnabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology
Enabling Smart Energy as a Service via 5G Mobile Network advances The Energy as a Service: when the Smart Energy uses the 5G technology Ljubljana, 5G PPP Phase 3 Stakeholders Info day October 17 2017 Fiorentino
More informationBuilding Distributed Access Control System Using Service-Oriented Programming Model
Building Distributed Access Control System Using Service-Oriented Programming Model Ivan Zuzak, Sinisa Srbljic School of Electrical Engineering and Computing, University of Zagreb, Croatia ivan.zuzak@fer.hr,
More informationEnabling Smart Energy as a Service via 5G Mobile Network advances
NR 5 Enabling Smart Energy as a Service via 5G Mobile Network advances 5G-PPP Phase 2 at EuCNC Oulu Fiorentino Giampaolo giampaolo.fiorentino@eng.it SCOPE MOTIVATION NR 5 Insights behind... The state of
More informationNGSON: Features, State of the Art, and Realization
NEXT GENERATION SERVICE OVERLAY NETWORKS (NGSON) NGSON: Features, State of the Art, and Realization Seung-Ik Lee and Shin-Gak Kang, Standards Research Center, Electronics and Telecommunications Research
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationDistributed Service Discovery Algorithm Based on Ant Colony Algorithm
70 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 Distributed Service Discovery Algorithm Based on Ant Colony Algorithm Chijun Zhang College of Management Science and Information Engineering, Jilin University
More informationGlobus Toolkit Firewall Requirements. Abstract
Globus Toolkit Firewall Requirements v0.3 8/30/2002 Von Welch Software Architect, Globus Project welch@mcs.anl.gov Abstract This document provides requirements and guidance to firewall administrators at
More informationSemantic SOA - Realization of the Adaptive Services Grid
Semantic SOA - Realization of the Adaptive Services Grid results of the final year bachelor project Outline review of midterm results engineering methodology service development build-up of ASG software
More informationService-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA) SOA is a software architecture in which reusable services are deployed into application servers and then consumed by clients in different applications or business processes.
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationOpenWay by Itron Security Overview
Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationA Web Services Based Platform for Exchange of Procedural CAD Models
A Web Services Based Platform for Exchange of Procedural CAD Models Xiang Chen, Min Li, Shuming Gao State Key Laboratory of CAD&CG, Zhejiang University (310027) {xchen, limin, smgao}@cad.zju.edu.cn Abstract
More informationCyber-Physical Chain (CPChain) Light Paper
Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain
More informationDeliverable D8.4 Certificate Transparency Log v2.0 Production Service
16-11-2017 Certificate Transparency Log v2.0 Production Contractual Date: 31-10-2017 Actual Date: 16-11-2017 Grant Agreement No.: 731122 Work Package/Activity: 8/JRA2 Task Item: Task 6 Nature of Deliverable:
More informationIntegration of Wireless Sensor Networks with a Service-Oriented Architecture
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Integration of Wireless Sensor Networks with a Service-Oriented Architecture by M.P. de Vos Supervisor:
More information2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationEXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT
EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT Daniel Kouřil, Michal Procházka, Luděk Matyska CESNET z. s. p. o., Zikova 4, 160 00 Praha 6, Czech Republic, and Masaryk University, Botanická
More informationICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington
ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington ( Presentation by Li Zao, 01-02-2005, Univercité Claude
More informationVirtual Community Management for Enabling P2P Services in the IMS Network
Virtual Community Management for Enabling P2P Services in the IMS Network Igor Radovanović, Johan Lukkien, Shudong Chen, Chris Molanus, Tanır Özçelebi Department of Mathematics and Computer Science, Eindhoven
More informationDistributed Automation System based on Java and Web Services
Distributed Automation System based on Java and Web Services Nikolay Kakanakov, Mitko Shopov, Grisha Spasov Abstract: The paper presents the implementation of a model for Distributed Automation Systems
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationResearch and Design Application Platform of Service Grid Based on WSRF
DOI: 10.7763/IPEDR. 2012. V49. 27 Research and Design Application Platform of Service Grid Based on WSRF Jianmei Ge a, Shying Zhang a College of Computer Science and Technology, Beihua University, No.1
More informationRealizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA)
Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) A presentation to GMU/AFCEA symposium "Critical Issues in C4I" Michelle Dirner, James Blalock, Eric Yuan National
More informationBuilding blocks: Connectors: View concern stakeholder (1..*):
1 Building blocks: Connectors: View concern stakeholder (1..*): Extra-functional requirements (Y + motivation) /N : Security: Availability & reliability: Maintainability: Performance and scalability: Distribution
More informationContext-aware Services for UMTS-Networks*
Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationWireless Sensor Networks and Advanced Metering Infrastructure Deployment in Smart Grid
Wireless Sensor Networks and Advanced Metering Infrastructure Deployment in Smart Grid O. M. Longe, K. Ouahada, H. C. Ferreira, S. Rimer Dept. of Electrical & Electronics Engineering Science, University
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
RESEARCH ARTICLE OPEN ACCESS Middleware Interoperability using SOA for Enterprise Business Application T Sathis Kumar Assistant Professor Department of Computer Science and Engineering Saranathan College
More informationWeb Services Development for IBM WebSphere Application Server V7.0
000-371 Web Services Development for IBM WebSphere Application Server V7.0 Version 3.1 QUESTION NO: 1 Refer to the message in the exhibit. Replace the??? in the message with the appropriate namespace.
More informationStudy on Ontology-based Multi-technologies Supported Service-Oriented Architecture
International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture GaiHai Li a, Gang Huang
More information(9A05803) WEB SERVICES (ELECTIVE - III)
1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationRouting Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network
More informationSMart esolutions Information Security
Information Security Agenda What are SMart esolutions? What is Information Security? Definitions SMart esolutions Security Features Frequently Asked Questions 12/6/2004 2 What are SMart esolutions? SMart
More informationThe Grid Authentication System for Mobile Grid Environment
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 02, 2014 ISSN (online): 2321-0613 The Grid Authentication System for Mobile Grid Environment A.Sudha 1 S.M.Karpagavalli
More informationThe Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne
The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based
More informationA Way to Personalize In-Home Healthcare and Assisted Living
Knowledge Foundation A Way to Personalize In-Home Healthcare and Assisted Living Wagner Ourique de Morais CERES Centre for Research on Embedded Systems CAISR Centre for Applied Intelligent Systems Research
More informationA Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol
A Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol FRANCO FRATTOLILLO, SALVATORE D ONOFRIO Research Centre on Software Technology Department of Engineering, University of Sannio Corso
More informationSmart Grid. Carbon Masters Whatcom County Extension October, Anjan Bose Washington State University Pullman, WA, USA
Smart Grid Anjan Bose Washington State University Pullman, WA, USA Carbon Masters Whatcom County Extension October, 2010 What is a SMART Grid? Self-heals Motivates and includes the consumer Resists attack
More informationNew Value Chain through Service Platform
New Value Chain through Service Platform Oct. 24 th 2008 Ryozo Ito Senior Executive Consultant Hewlett-Packard Japan Technology for better business outcomes 2008 Hewlett-Packard Development Company, L.P.
More informationOracle SOA Suite 11g: Build Composite Applications
Oracle University Contact Us: 1.800.529.0165 Oracle SOA Suite 11g: Build Composite Applications Duration: 5 Days What you will learn This course covers designing and developing SOA composite applications
More informationWSDL Interface of Services for Distributed Search in Databases
WSDL Interface of s for Distributed Search in s Elena Ivanova Abstract: oriented architecture and two layers model of a service are described. WSDL technology is applied to implement a network interface
More informationService-Oriented Computing in Recomposable Embedded Systems
Service-Oriented Computing in Recomposable Embedded Systems Autonomous + Backend Support Yinong Chen Department of Computer Science and Engineering http://www.public.asu.edu/~ychen10/ 2 Motivation Embedded
More informationA Framework Supporting Quality of Service for SOA-based Applications
A Framework Supporting Quality of Service for SOA-based Applications Phung Huu Phu, Dae Seung Yoo, and Myeongjae Yi School of Computer Engineering and Information Technology University of Ulsan, Republic
More informationSecurity Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B
More informationSemantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Spring 90-91
بسمه تعالی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Spring 90-91 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service
More informationA Self Analysing and Reliable SOA Model
A Self Analysing and Reliable SOA Model Prachet Bhuyan #, Asima Das #, Durga Prasad Mohapatra * # School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India * Department of Computer Science
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationDESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION
DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION Abstract: 1 K.Maithili, 2 R.Ruhin Kouser, 3 K.Suganya, 1,2,3 Assistant Professor, Department of Computer Science Engineering Kingston
More informationEnterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationNext Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4
Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4
More informationThe Cryptographic Sensor
The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective
More informationJBI Components: Part 1 (Theory)
1 Introduction JBI s: Part 1 (Theory) Ron Ten-Hove, Sun Microsystems Copyright 2006, Sun Microsystems, Inc. JBI components are where the SOA rubber hits the road: they provide and use the services that
More informationImplementation Method of OGC Web Map Service Based on Web Service. Anthony Wenjue Jia *,Yumin Chen *,Jianya Gong * *Wuhan University
Implementation Method of OGC Web Map Service Based on Web Service Anthony Wenjue Jia *,Yumin Chen *,Jianya Gong * *Wuhan University ABSTRACT The most important advantage of web service is the multi-platform,
More informationStrong Authentication for Web Services using Smartcards
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Strong Authentication for Web Services using Smartcards D S. Stienne
More informationA Web Service for Exchanging Procedural CAD Models between heterogeneous CAD systems
A Web Service for Exchanging Procedural CAD Models between heterogeneous CAD systems Xiang Chen, Min Li, Shuming Gao State Key Laboratory of CAD&CG, Zhejiang University (310027) {xchen, limin, smgao}@cad.zju.edu.cn
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,
More informationAn Efficient Image Processing Method Based on Web Services for Mobile Devices
An Efficient Image Processing Method Based on Web Services for Mobile Devices Yi Liang a,b a Tianjin Key Lab of Intelligent Computing & Novel Software Technology, Tianjin University of Technology Tianjin,
More informationMobile ad hoc networks Various problems and some solutions
Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems
More informationCollaborative Framework for Testing Web Application Vulnerabilities Using STOWS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationDS 2009: middleware. David Evans
DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between
More informationWeb Services Architecture Directions. Rod Smith, Donald F Ferguson, Sanjiva Weerawarana IBM Corporation
Web Services Architecture Directions Rod Smith, Donald F Ferguson, Sanjiva Weerawarana 1 Overview Today s Realities Web Services Architecture Elements Web Services Framework Conclusions & Discussion 2
More informationSecurity Technologies for Dynamic Collaboration
Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi
More informationSecure Development Lifecycle
Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationChapter 8 Web Services Objectives
Chapter 8 Web Services Objectives Describe the Web services approach to the Service- Oriented Architecture concept Describe the WSDL specification and how it is used to define Web services Describe the
More informationA Ubiquitous Web Services Framework for Interoperability in Pervasive Environments
A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments Hyung-Jun Yim and Kyu-Chul Lee * Dept. of Computer Engineering, Chungnam National University 220 Gung-Dong, Yuseong-Gu,
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationCAS 703 Software Design
Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction
More informationChapter 17 Web Services Additional Topics
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch
More informationMPEG-21: The 21st Century Multimedia Framework
MPEG-21: The 21st Century Multimedia Framework Jan Bormans, Jean Gelissen, and Andrew Perkis IEEE Signal Processing Magazine, March 2003 Outline Context and motivation of MPEG-21 An overview of MPEG-21
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationIntroduction to Grid Technology
Introduction to Grid Technology B.Ramamurthy 1 Arthur C Clarke s Laws (two of many) Any sufficiently advanced technology is indistinguishable from magic." "The only way of discovering the limits of the
More informationAn agent-based peer-to-peer grid computing architecture
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 An agent-based peer-to-peer grid computing architecture J. Tang University
More informationC exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.
C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION
More informationImplementing a Ground Service- Oriented Architecture (SOA) March 28, 2006
Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationOpen mustard seed. Patrick Deegan, Ph.D. ID3
Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal
More informationWorkshop on Web of Services for Enterprise Computing
Workshop on Web of Services for Enterprise Computing Fujitsu Submission v0.2 Authors: Jacques Durand Tom Rutt Hamid BenMalek Acknowledgements: Masahiko Narita Paul A. Knapp 1. The Great Divide The fundamental
More informationA Messaging-Based Integration Architecture for Print Production Workflow Systems
A Messaging-Based Integration Architecture for Print Production Workflow Systems Claes Buckwalter Digital Media, ITN, Linköping University, Sweden Abstract A print production workflow consists of a number
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationProximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices
Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer
More informationServer-based Certificate Validation Protocol
Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional
More informationDynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks
International Journal of Computational Engineering Research Vol, 03 Issue, 4 Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks 1, K. Priyadharshini, 2, V. Kathiravan, 3,
More informationA Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction
A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one
More informationF O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00
F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...
More informationRemote Entrusting of Mobile Multi-Agent Systems
Remote Entrusting of Mobile Multi-Agent Systems Kevin Jones kij@dmu.ac.uk http://www.cse.dmu.ac.uk/~kij Re-Trust 08 - Trento, Italy 16 th October 2008 Itinerary Mobile- Agent Systems Remote Entrusting
More informationSERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT
SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University
More informationSecurity in the Web Services Framework
Security in the Web Services Framework Chen Li and Claus Pahl Dublin City University School of Computing Dublin 9 Ireland Abstract The Web Services Framework provides techniques to enable the application-toapplication
More informationIBM Research Report. A Web-Services-Based Deployment Framework in Grid Computing Environment
RC 22470 (W0205-219) May 31, 2002 IBM Research Report A Web--Based Deployment Framework in Grid Computing Environment Zongwei Luo, Shyh-Kwei Chen, Santhosh Kumaran, Liang-Jie Zhang, Jen-Yao Chung, Henry
More information